CVE-2016-10396

Severity
7.5HIGH
EPSS
2.1%
top 16.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 6
Latest updateMay 17

Description

The racoon daemon in IPsec-Tools 0.8.2 contains a remotely exploitable computational-complexity attack when parsing and storing ISAKMP fragments. The implementation permits a remote attacker to exhaust computational resources on the remote endpoint by repeatedly sending ISAKMP fragment packets in a particular order such that the worst-case computational complexity is realized in the algorithm utilized to determine if reassembly of the fragments can take place.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Ubuntuipsec-tools< 1:0.8.2+20140711-10

🔴Vulnerability Details

3
GHSA
GHSA-575v-phrx-cjcp: The racoon daemon in IPsec-Tools 02022-05-17
CVEList
CVE-2016-10396: The racoon daemon in IPsec-Tools 02017-07-06
OSV
CVE-2016-10396: The racoon daemon in IPsec-Tools 02017-07-05

📋Vendor Advisories

2
Ubuntu
ipsec-tools vulnerability2017-11-16
Red Hat
ipsec-tools: Parsing and storing ISAKMP fragments in malicious order can exhaust resources2016-12-02

💬Community

3
Bugzilla
CVE-2016-10396 ipsec-tools: Parsing and storing ISAKMP fragments in malicious order can exhaust resources [fedora-all]2017-07-12
Bugzilla
CVE-2016-10396 ipsec-tools: Parsing and storing ISAKMP fragments in malicious order can exhaust resources2017-07-12
Bugzilla
CVE-2016-10396 ipsec-tools: Parsing and storing ISAKMP fragments in malicious order can exhaust resources [epel-all]2017-07-12